<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Parent Presence Newsletter: Always On]]></title><description><![CDATA[For all parents. Weekly digest on AI news, legislation updates and practical guides for the whole family.]]></description><link>https://giulianamartha.substack.com/s/always-on</link><image><url>https://substackcdn.com/image/fetch/$s_!XC8X!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1cfe9ed1-6b64-4eb9-8e08-925f118e0da5_500x500.png</url><title>Parent Presence Newsletter: Always On</title><link>https://giulianamartha.substack.com/s/always-on</link></image><generator>Substack</generator><lastBuildDate>Thu, 21 May 2026 00:51:41 GMT</lastBuildDate><atom:link href="https://giulianamartha.substack.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Giuliana Martha Alves Pereira]]></copyright><language><![CDATA[pt]]></language><webMaster><![CDATA[giulianamartha@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[giulianamartha@substack.com]]></itunes:email><itunes:name><![CDATA[Giuliana Martha Alves Pereira]]></itunes:name></itunes:owner><itunes:author><![CDATA[Giuliana Martha Alves Pereira]]></itunes:author><googleplay:owner><![CDATA[giulianamartha@substack.com]]></googleplay:owner><googleplay:email><![CDATA[giulianamartha@substack.com]]></googleplay:email><googleplay:author><![CDATA[Giuliana Martha Alves Pereira]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[The app your child uses at school may be selling their data ]]></title><description><![CDATA[Why criminals attack educational platforms and what they do with the data.]]></description><link>https://giulianamartha.substack.com/p/the-app-your-child-uses-at-school</link><guid isPermaLink="false">https://giulianamartha.substack.com/p/the-app-your-child-uses-at-school</guid><dc:creator><![CDATA[Giuliana Martha Alves Pereira]]></dc:creator><pubDate>Mon, 18 May 2026 12:08:50 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!RbUY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb18202ca-134b-4fdd-9a05-bcb2be7ea95c_5472x3648.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Last week, <a href="https://www.instructure.com/incident_update">Canvas</a>, a learning management platform used by more than 30 million users in more than 8,000 educational institutions around the world, suffered the largest educational data leak recorded in history. The ShinyHunters ransomware group claimed to have accessed 3.65 terabytes of data, including names, email addresses, student identification numbers and private messages exchanged between students and teachers. Universities such as Harvard, Columbia, Princeton, and Georgetown confirmed the impact. The Queensland Minister of Education stated that the attack may have affected data of 200 million people.</p><p>Canvas is just the latest case. In December 2024, the <a href="https://techcrunch.com/2025/01/07/powerschool-data-breach/">PowerSchool</a> platform, used by more than 60 million students in North America, suffered an attack that exposed the names, addresses, social security numbers and medical records of students, including children under the age of five.</p><p>According to the <a href="https://security.geant.org/global-cyber-attacks-surge-21-in-q2-2025-europe-experiences-the-highest-increase-of-all-regions/">G&#233;ant Security research</a>, the education sector averaged 4,388 cyberattacks per week in Q2 2025, 31% increase year-over-year. Third-party vendors are responsible for the majority of breaches.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!RbUY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb18202ca-134b-4fdd-9a05-bcb2be7ea95c_5472x3648.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!RbUY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb18202ca-134b-4fdd-9a05-bcb2be7ea95c_5472x3648.jpeg 424w, https://substackcdn.com/image/fetch/$s_!RbUY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb18202ca-134b-4fdd-9a05-bcb2be7ea95c_5472x3648.jpeg 848w, https://substackcdn.com/image/fetch/$s_!RbUY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb18202ca-134b-4fdd-9a05-bcb2be7ea95c_5472x3648.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!RbUY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb18202ca-134b-4fdd-9a05-bcb2be7ea95c_5472x3648.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!RbUY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb18202ca-134b-4fdd-9a05-bcb2be7ea95c_5472x3648.jpeg" width="610" height="406.80631868131866" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b18202ca-134b-4fdd-9a05-bcb2be7ea95c_5472x3648.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:610,&quot;bytes&quot;:4648386,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://giulianamartha.substack.com/i/197832840?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb18202ca-134b-4fdd-9a05-bcb2be7ea95c_5472x3648.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!RbUY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb18202ca-134b-4fdd-9a05-bcb2be7ea95c_5472x3648.jpeg 424w, https://substackcdn.com/image/fetch/$s_!RbUY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb18202ca-134b-4fdd-9a05-bcb2be7ea95c_5472x3648.jpeg 848w, https://substackcdn.com/image/fetch/$s_!RbUY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb18202ca-134b-4fdd-9a05-bcb2be7ea95c_5472x3648.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!RbUY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb18202ca-134b-4fdd-9a05-bcb2be7ea95c_5472x3648.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><div><hr></div><h3>Why criminals attack educational platforms</h3><p>Most parents assume that cyberattacks on schools are intended to disrupt classes. The disruption is a side effect. <strong>The real objective is the data</strong>.</p><p>The FBI&#8217;s <a href="https://www.ic3.gov/AnnualReport/Reports/2025_IC3Report.pdf">Internet Crime Complaint Center</a> reported cybercrime losses exceeding $20.9 billion in 2025, a 26% increase over the previous year. Global cybercrime costs reached $10.5 trillion annually in 2025, a number that, if cybercrime were a country, would make it the world&#8217;s third-largest economy, behind only the United States and China. Data is the most valuable asset in the digital economy, and criminal organizations operate around it with the same logic as any other market: supply, demand, packaging, and distribution. </p><p>When sensitive data is stolen, it does not simply disappear. It moves through four distinct stages: aggregation, packaging, listing, and distribution. Credentials are tested against live services before being listed for sale. Material is assembled into bundles. The package is posted on dark web marketplaces, often within hours of capture. Buyers purchase the data, monetize it through fraud or account takeover, and often resell it. Stolen identity records circulate in criminal markets for years, generating losses long after the original breach. </p><p>Educational platforms are particularly attractive targets for three reasons. First, they hold an unusual concentration of sensitive data in a single place, names, email addresses, student ID numbers, private messages between students and advisors, medical accommodation requests, and in some cases financial information. Second, schools and universities historically underinvest in cybersecurity compared to financial institutions. The <a href="https://blog.checkpoint.com/research/global-cyber-attacks-surge-21-in-q2-2025-europe-experiences-the-highest-increase-of-all-regions/">education sector</a> averaged 4,388 cyberattacks per organization per week in Q2 2025, a 31% year-over-year increase, with third-party vendors responsible for the majority of incidents. Third, student data has a long shelf life, a <a href="https://giulianamartha.substack.com/p/how-would-i-know-if-my-childs-identity">child&#8217;s identity stolen</a> today may not surface as a problem until they apply for their first loan a decade later. </p><h3><strong>What criminals do with the data: the full picture</strong></h3><p>Once data is extracted, the criminal economy around it is sophisticated and varied:</p><ul><li><p><strong>Identity theft for financial fraud</strong> &#8212; name, date of birth, and student ID number are sufficient to open credit lines, apply for loans, or file fraudulent tax returns in someone else&#8217;s name. <a href="https://www.crowdstrike.com/en-us/global-threat-report/">31% of all data breaches</a> involve stolen or compromised credentials, making it the single most common initial attack vector for over a decade. </p></li><li><p><strong>Sale on dark web marketplaces</strong> &#8212; basic personal information including name and email <a href="https://www.onpointcu.com/blog/understanding-the-illegal-market-for-personal-information/">sells for under $15</a> due to oversupply from repeated breaches. High-value access such as verified bank logins commands over $1,000. The market operates with escrow systems, buyer reviews, and pricing tiers that mirror legitimate e-commerce. </p></li><li><p><strong>Spear phishing</strong> &#8212; stolen Canvas data enables highly convincing follow-on attacks. Criminals now have real names, institutional email addresses, course context, and private message history, making it possible to craft phishing messages nearly indistinguishable from legitimate institutional communications. A student receiving an email referencing their actual professor, their actual course, and their actual grade is far more likely to click a malicious link. </p></li><li><p><strong>Child identity theft</strong> &#8212; children are particularly vulnerable because their credit history is clean and the fraud may go undetected for years. According to <a href="https://blog.defend-id.com/2025/08/07/child-identity-theft-protection-2025/">Defend-ID</a> (2025), children are more than 50 times more vulnerable to identity theft than adults, with 25% of minors having their identity stolen before the age of 18.</p></li><li><p><strong>Ransomware and extortion</strong> &#8212; ShinyHunters threatened to release Canvas&#8217;s full dataset unless a ransom was paid. The group claimed access to several billions of private messages, giving institutions deadlines to negotiate settlements. Even when a ransom is paid, there is no guarantee that data was not copied before deletion. </p></li><li><p><strong>Credential stuffing</strong> &#8212; when the same password is used across multiple sites, a breach at one platform grants attackers access to all others. <a href="https://www.sentinelone.com/cybersecurity-101/cybersecurity/data-breach-statistics/">It takes organizations</a> an average of 204 days to detect a breach and 73 more to contain it, a combined 277 days during which stolen credentials can be used freely. </p></li><li><p><strong>Long-term surveillance and manipulation</strong> &#8212; private messages between students and advisors, medical accommodation requests, and personal disclosures shared on educational platforms can be used for blackmail, targeted manipulation, or as reconnaissance for future attacks.</p></li></ul><p><strong>For parents, the takeaway is direct: </strong>the data your child&#8217;s school holds is not just an administrative record. It is a financial asset in a criminal market. Understanding that reframes what it means to ask a school which platforms they use and what data agreements they have signed.</p><div class="pullquote"><p>89% of educational technology products recommended during the pandemic were able to monitor children, and many shared data with advertising technology companies. </p></div><h3>What the law says and parents should know</h3><p>Under the GDPR, schools act as data controllers and are legally responsible for ensuring that any platform they use meets children&#8217;s data protection standards. This means that schools must have Data Processing Agreements with each technology supplier, apply the principle of data minimization, and not allow student data to be used for commercial purposes. The Brazilian LGPD establishes equivalent obligations. In the US, <a href="https://studentprivacy.ed.gov/ferpa">FERPA</a> (Family Educational Rights and Privacy Act) protects students&#8217; educational records.</p><p><strong>Parents have the right</strong> to ask the school what data has been collected, how long it is kept, and if it is shared with third parties.</p><div><hr></div><h3>What to do right now</h3><ul><li><p><strong>Take control: device settings and account access:</strong></p><ul><li><p>Contact the school in writing and ask: what digital platforms they use, <strong>what data they collect about students</strong>, <strong>with whom</strong> t<strong>hey share them</strong>, and <strong>how long they keep them</strong>.</p></li><li><p>If your child uses Canvas or PowerSchool, <strong>immediately change the account password</strong> and enable <strong>two-factor authentication</strong>.</p></li><li><p>After this week&#8217;s attack, <strong>be aware of phishing emails</strong> that reference Canvas, specific courses, or real teacher names. The stolen data makes these attacks highly convincing.</p></li><li><p>The FBI explicitly advises: <strong>do not respond to any contact</strong> from those who claim to have your data, and do not make any payment.</p><p></p></li></ul></li><li><p><strong>Open the conversation: what to say and when:</strong></p><ul><li><p><strong>Explain to your child</strong> that information shared on school platforms, including private messages with teachers, can be accessed by third parties in case of an attack.</p></li><li><p>Teach the basic rule: <strong>never share sensitive personal information</strong>, such as address, phone number, or family situation, in school platform chats.</p></li></ul></li></ul><h3>What to keep on the radar</h3><p>The attack on Canvas happened this week. If your child studies at an institution that uses the platform, check the school&#8217;s announcements and access the official <a href="https://www.instructure.com/incident_update">Instructure website</a> to follow the updates. </p><p>The Australian OAIC and several European data protection agencies have already opened investigation processes.</p><p></p>]]></content:encoded></item><item><title><![CDATA[Com que idade meu filho deve ter um smartphone?]]></title><description><![CDATA[Os dados cient&#237;ficos, os riscos, as leis e um framework para te ajudar a decidir por seus pr&#243;prios termos.]]></description><link>https://giulianamartha.substack.com/p/com-que-idade-meu-filho-deve-ter</link><guid isPermaLink="false">https://giulianamartha.substack.com/p/com-que-idade-meu-filho-deve-ter</guid><dc:creator><![CDATA[Giuliana Martha Alves Pereira]]></dc:creator><pubDate>Thu, 14 May 2026 21:23:58 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!tlap!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65a28e0e-e395-4972-a2ca-5f71fd505cfb_5616x3744.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Sendo direta: n&#227;o existe hoje uma resposta baseada em dados com causalidade comprovada para orientar os pais nessa quest&#227;o. Existe um debate cient&#237;fico real e relevante, mas a decis&#227;o ser&#225; sempre dos pais, constru&#237;da a partir de informa&#231;&#227;o adequada, da circunst&#226;ncia familiar e da maturidade dos filhos.</p><p><a href="https://parentpresence.org/#pricing">Presen&#231;a</a> &#233; a primeira e mais importante camada de prote&#231;&#227;o digital. Este artigo aborda os dados, desde a idade at&#233; a sa&#250;de mental; os riscos, desde aliciamento e pornografia at&#233; a perda de privacidade; e um modelo de tomada de decis&#227;o para ajudar os pais a agirem com informa&#231;&#227;o, inten&#231;&#227;o e consci&#234;ncia.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://giulianamartha.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscrever&quot;,&quot;language&quot;:&quot;pt&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Parent Presence Newsletter &#233; uma publica&#231;&#227;o apoiada pelos leitores. Para receber novos posts e apoiar o meu trabalho, considere tornar-se um subscritor gratuito ou pago.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Digite o seu e-mail..." tabindex="-1"><input type="submit" class="button primary" value="Subscrever"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!tlap!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65a28e0e-e395-4972-a2ca-5f71fd505cfb_5616x3744.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!tlap!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65a28e0e-e395-4972-a2ca-5f71fd505cfb_5616x3744.jpeg 424w, https://substackcdn.com/image/fetch/$s_!tlap!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65a28e0e-e395-4972-a2ca-5f71fd505cfb_5616x3744.jpeg 848w, https://substackcdn.com/image/fetch/$s_!tlap!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65a28e0e-e395-4972-a2ca-5f71fd505cfb_5616x3744.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!tlap!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65a28e0e-e395-4972-a2ca-5f71fd505cfb_5616x3744.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!tlap!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65a28e0e-e395-4972-a2ca-5f71fd505cfb_5616x3744.jpeg" width="572" height="381.4642857142857" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/65a28e0e-e395-4972-a2ca-5f71fd505cfb_5616x3744.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:572,&quot;bytes&quot;:10102053,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://giulianamartha.substack.com/i/197191665?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65a28e0e-e395-4972-a2ca-5f71fd505cfb_5616x3744.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!tlap!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65a28e0e-e395-4972-a2ca-5f71fd505cfb_5616x3744.jpeg 424w, https://substackcdn.com/image/fetch/$s_!tlap!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65a28e0e-e395-4972-a2ca-5f71fd505cfb_5616x3744.jpeg 848w, https://substackcdn.com/image/fetch/$s_!tlap!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65a28e0e-e395-4972-a2ca-5f71fd505cfb_5616x3744.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!tlap!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65a28e0e-e395-4972-a2ca-5f71fd505cfb_5616x3744.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3><strong>O que os dados dizem sobre idade</strong></h3><p>A pesquisa <a href="https://research.com/education/what-age-should-a-child-get-a-smartphone">Pew Research Center de 2025</a> mostrou que 95% dos adolescentes entre 13 e 17 anos possu&#237;am smartphone em 2024. Mais da metade dos pais com filhos entre 11 e 12 anos disse o mesmo. Quase 30% dos pais com filhos entre 8 e 10 anos tamb&#233;m.</p><p>A idade apropriada permanece indefinida. Alguns <a href="https://www.cbsnews.com/news/children-smartphones-increased-risk-of-health-problems-study/">especialistas</a> sugerem 13-14 anos como marco adequado, mas pediatras, psic&#243;logos e educadores tendem a n&#227;o dar respostas definitivas, e geralmente devolvem a decis&#227;o aos pais.</p><div><hr></div><h3><strong>O que a ci&#234;ncia diz sobre sa&#250;de mental</strong></h3><p><a href="https://jonathanhaidt.com/anxious-generation/">Jonathan Haidt</a>, em seu livro <em>The Anxious Generation</em> (2024), examina o aumento acentuado de ansiedade, depress&#227;o e dificuldades sociais entre crian&#231;as, associando essas tend&#234;ncias &#224; dissemina&#231;&#227;o de smartphones e ao decl&#237;nio da inf&#226;ncia baseada em experi&#234;ncias independentes. O livro aponta quatro danos fundamentais: priva&#231;&#227;o social, perturba&#231;&#227;o do sono, fragmenta&#231;&#227;o da aten&#231;&#227;o e depend&#234;ncia.</p><p>Uma revis&#227;o sistem&#225;tica do <a href="https://pmc.ncbi.nlm.nih.gov/articles/PMC6883663/">King&#8217;s College London</a>, com 41.871 crian&#231;as e jovens, encontrou que o uso problem&#225;tico de smartphone estava associado a 3,17x mais chances de depress&#227;o, 3,05x de ansiedade e 2,60x de sono de m&#225; qualidade.</p><p>O estudo mais relevante vem de pesquisadores do Children&#8217;s Hospital Philadelphia, UC Berkeley e Columbia University, que analisaram dados de mais de 10.000 adolescentes no <a href="https://jamanetwork.com/journals/jama/article-abstract/2843506">Adolescent Brain Cognitive Development Study</a>, o maior estudo longitudinal de desenvolvimento cerebral infantil dos EUA. Crian&#231;as que receberam smartphones mais cedo tiveram maiores riscos de sono inadequado e obesidade, com piores resultados quanto mais novas eram. A m&#233;dia de idade do primeiro smartphone foi de 11 anos.</p><p>Em contrapartida, cr&#237;ticos como <a href="https://www.theguardian.com/commentisfree/2026/mar/02/ban-children-social-media-biometic-data-surveilled">Taylor Lorenz</a> argumentam que restri&#231;&#245;es a redes sociais, por exemplo, afetam desproporcionalmente jovens de grupos minorit&#225;rios, para quem o acesso digital representa inclus&#227;o e conex&#227;o. </p><p>Os estudos existentes s&#227;o majoritariamente correlacionais e o fato de ainda n&#227;o haver prova de causalidade direta provoca o debate atual. Mas a consist&#234;ncia dos resultados em diferentes pa&#237;ses e metodologias &#233; suficientemente forte para justificar precau&#231;&#227;o.</p><div><hr></div><h3><strong>O &#226;ngulo da privacidade de dados</strong></h3><p>A maioria dos pais pensa em privacidade como "n&#227;o compartilhar senha" ou "n&#227;o falar com estranhos." Mas quando uma crian&#231;a tem smartphone, a privacidade j&#225; foi comprometida muito antes disso, e sem que ningu&#233;m perceba. S&#227;o tr&#234;s camadas que os pais precisam entender:</p><ul><li><p>Dados pessoais e consentimento</p></li><li><p>Profiling e manipula&#231;&#227;o comercial</p></li><li><p>Dark patterns e design aditivo</p></li></ul><h4>Dados pessoais: como empresas coletam consentimento</h4><p>Quando uma crian&#231;a cria uma conta (em qualquer plataforma) ela fornece dados pessoais e aceita termos de uso que ela n&#227;o tem capacidade legal nem cognitiva de compreender. O consentimento que a crian&#231;a "deu" ao criar a conta n&#227;o &#233; consentimento legal. Os pais s&#227;o os respons&#225;veis legais por essa decis&#227;o, mas a maioria nunca foi informada disso.</p><p>Pela lei europeia GDPR (General Data Protection Regulation), crian&#231;as menores de 16 anos n&#227;o podem legalmente consentir com o processamento dos seus dados pessoais sem autoriza&#231;&#227;o parental expl&#237;cita. Alguns pa&#237;ses europeus reduziram para 13 anos; da mesma forma, segue os EUA com o Children&#8217;s Online Privacy Protection Act (COPPA). A LGPD brasileira estabelece o mesmo padr&#227;o europeu. </p><p>O Age Appropriate Design Code europeu e o Digital Services Act (DSA) est&#227;o tentando corrigir essa lacuna, exigindo que plataformas apliquem <em>consentimento adequado &#224; idade</em>, um padr&#227;o legal que vai al&#233;m de uma caixa de sele&#231;&#227;o e exige que os servi&#231;os sejam projetados com os direitos das crian&#231;as como ponto de partida, n&#227;o como ajuste posterior.</p><h4><strong>Profiling: perfil comportamental</strong></h4><p>Assim que uma conta &#233; criada, a coleta de dados come&#231;a. Cada clique, cada pausa, cada conte&#250;do assistido at&#233; o final alimenta o perfil do usu&#225;rio. Esse processo chama-se<em> profiling</em>: a constru&#231;&#227;o de um perfil detalhado de prefer&#234;ncias, interesses, estados emocionais e padr&#245;es de comportamento. Empresas criam este perfil para que, atrav&#233;s de decis&#245;es automatizadas, seja poss&#237;vel escolher o que o usu&#225;rio ver&#225; em seguida dentro daquela plataforma. No que tange &#224;s redes sociais e jogos online, o objetivo &#233; reter a aten&#231;&#227;o ao m&#225;ximo dentro da plataforma.</p><p><strong>O impacto direto:</strong></p><ul><li><p>Algoritmos identificam estado emocional e podem aumentar a exposi&#231;&#227;o a certos conte&#250;do</p></li><li><p>Publicidade direcionada a menores com base em comportamento, pr&#225;tica proibida pelo GDPR mas praticada</p></li><li><p>Recomenda&#231;&#227;o de conte&#250;do progressivamente mais extremo para maximizar tempo de tela</p></li></ul><p>O GDPR pro&#237;be explicitamente o <em>profiling</em> e o <em>automated decision-making </em>de crian&#231;as para fins comerciais, conforme o Artigo 22. O DSA ampliou essa proibi&#231;&#227;o em 2024, banindo publicidade direcionada a menores com base em dados comportamentais. Ambas as leis existem porque o dano &#233; documentado, mas a aplica&#231;&#227;o depende de pais que conhecem e exercem os seus direitos.</p><h4><strong>Dark patterns e design viciante</strong></h4><p>Plataformas s&#227;o projetadas para maximizar engajamento. Para crian&#231;as, isso &#233; especialmente problem&#225;tico porque o c&#233;rebro em desenvolvimento &#233; mais suscet&#237;vel a mecanismos de recompensa vari&#225;vel, o mesmo princ&#237;pio das <em>slot machines</em>, como ca&#231;a-n&#237;queis. </p><p><em>Dark patterns</em> &#233; o termo t&#233;cnico e jur&#237;dico para escolhas de design que manipulam o comportamento do utilizador contra os seus pr&#243;prios interesses. Exemplos concretos para pais entenderem:</p><ul><li><p>Notifica&#231;&#245;es que interrompem propositalmente para criar h&#225;bito</p></li><li><p>Scroll infinito que elimina pontos naturais de parada</p></li><li><p>Likes e rea&#231;&#245;es que criam depend&#234;ncia de valida&#231;&#227;o social</p></li><li><p>Autoplay que remove a decis&#227;o ativa de continuar assistindo</p></li></ul><p>Estes s&#227;o recursos de engenharia deliberada com <a href="https://better-internet-for-kids.europa.eu/en/learning-corners/teachers-and-educators/persuasive-design">efeitos documentados</a> na aten&#231;&#227;o, no sono e na regula&#231;&#227;o emocional. O Estatuto Digital da Crian&#231;a e do Adolescente brasileiro, em vigor desde mar&#231;o de 2026, pro&#237;be explicitamente scroll infinito e autoplay para menores de 16 anos. O DSA exige que plataformas realizem avalia&#231;&#245;es de risco espec&#237;ficas sobre o impacto do design viciante em menores.</p><h4><strong>Por que isso importa al&#233;m do dispositivo</strong></h4><p><strong>A crian&#231;a &#233; perfilada sem que os pais saibam. </strong>O algoritmo sabe mais sobre os interesses, medos e vulnerabilidades do filho do que muitos pais. Esse perfil &#233; usado comercialmente e pode ser explorado por terceiros.</p><p><strong>Conte&#250;do inadequado chega por recomenda&#231;&#227;o, n&#227;o por busca. </strong>A crian&#231;a n&#227;o precisa procurar pornografia ou conte&#250;do violento. O algoritmo entrega. Pais que n&#227;o entendem <em>profiling</em> acreditam que basta &#8220;n&#227;o deixar o filho buscar.&#8221;</p><p><strong>Publicidade direcionada a menores funciona de forma invis&#237;vel. </strong>Crian&#231;as s&#227;o alvo de estrat&#233;gias de marketing sofisticadas que exploram suas inseguran&#231;as. Pais que n&#227;o sabem disso n&#227;o conseguem nomear o que est&#227;o vendo no comportamento de consumo dos filhos.</p><p><strong>Predadores usam dados p&#250;blicos para personalizar abordagem.</strong> O <em>grooming</em> come&#231;a com an&#225;lise de comportamento online. Dados que a crian&#231;a &#8220;compartilha&#8221; ao usar plataformas s&#227;o acess&#237;veis a quem sabe onde procurar.</p><p><strong>A crian&#231;a n&#227;o tem direitos que n&#227;o conhece.</strong> Direito de apagar dados, direito de n&#227;o ser perfilada, direito de n&#227;o receber publicidade direcionada, existem em lei mas precisam ser exercidos. Pais que n&#227;o sabem n&#227;o podem exercer esses direitos pelos filhos.</p><div><hr></div><h3><strong>A amea&#231;a que ningu&#233;m quer nomear</strong></h3><p>Ao falarmos sobre smartphones, n&#227;o se trata apenas de uma quest&#227;o de tempo de tela. Existe uma amea&#231;a real &#224; seguran&#231;a e &#224; prote&#231;&#227;o infantil porque o mundo digital tornou-se uma porta de entrada para ambientes onde adultos procuram crian&#231;as ativamente, bem como tornou-se um instrumento de gera&#231;&#227;o de v&#237;cios atrav&#233;s de mecanismos de dopamina para os quais nem o c&#233;rebro adulto est&#225; preparado &#8212; quanto mais o de crian&#231;as e adolescentes em desenvolvimento.</p><h4><strong>Pornografia</strong></h4><p>Segundo pesquisa da <a href="https://www.commonsensemedia.org/research/teens-and-pornography">Common Sense Media</a> com mais de 1.300 adolescentes, 54% viram pornografia online pela primeira vez antes dos 13 anos. A m&#233;dia de idade &#233; 12 anos.</p><ul><li><p>58% relataram exposi&#231;&#227;o acidental</p></li><li><p>44% acederam a conte&#250;do pornogr&#225;fico num dispositivo fornecido pela escola</p></li><li><p>1/3 viu pornografia em aplicativos de redes sociais</p></li><li><p>94% acederam num dispositivo eletr&#243;nico, 89% estavam em casa</p></li></ul><p>O artigo do <a href="https://ifstudies.org/blog/number-1-in-2024-what-happens-when-children-are-exposed-to-pornography">Institute for Family Studies</a> explica em detalhes as consequ&#234;ncias grav&#237;ssimas da exposi&#231;&#227;o precoce &#224; pornografia. Al&#233;m disso, conclui que o c&#233;rebro das crian&#231;as n&#227;o est&#225; preparado para processar as experi&#234;ncias adultas retratadas na pornografia e que esta est&#225; destruindo a intera&#231;&#227;o social e o anseio por conex&#227;o pessoal.</p><h4><strong>Grooming, sextortion e explora&#231;&#227;o</strong></h4><p>Em <a href="https://www.missingkids.org/blog/2025/ncmec-releases-new-data-2024-in-numbers">2024</a>, o NCMEC &#8212; National Center for Missing and Exploited Children &#8212; recebeu quase 100 relat&#243;rios de sextortion financeira por dia. Desde 2021, pelo menos 36 adolescentes tiraram as pr&#243;prias vidas como resultado direto de sextortion. Com o avan&#231;o da IA generativa, criminosos criam <em>deepfakes</em> sexualizadas a partir de fotos p&#250;blicas de crian&#231;as para extors&#227;o e ass&#233;dio.</p><p>No <a href="https://www.missingkids.org/blog/2025/spike-in-online-crimes-against-children-a-wake-up-call">primeiro semestre de 2025,</a> relat&#243;rios de aliciamento online saltaram de 292.951 para 518.720 &#8212; aumento de 77%. Relat&#243;rios envolvendo IA generativa na explora&#231;&#227;o infantil passaram de 6.835 para 440.419 no mesmo per&#237;odo.</p><p>Em ambientes de gaming, uma situa&#231;&#227;o de alto risco de <em>grooming</em> demora em m&#233;dia <a href="https://www.weprotect.org/thematic/online-grooming/">45 minutos</a> para se desenvolver, mas pode acontecer em 19 segundos.</p><p>Mais de 70% das <a href="https://blueribbonproject.org/resource-library/prevention-safety/301-protecting-children-online-a-comprehensive-guide-to-internet-safety-digital-dangers-and-what-families-can-do">imagens de abuso sexual infantil</a> identificadas nos &#250;ltimos anos foram autogeradas. Isso n&#227;o reflete consentimento. Reflete a efic&#225;cia das t&#225;ticas de grooming em fazer a crian&#231;a acreditar que n&#227;o tem outra op&#231;&#227;o.</p><div><hr></div><h3><strong>Framework CAMPP: um guia para os pais</strong></h3><p>Com base nos dados apresentados neste artigo, pensei muito sobre quais pilares precisamos levar em considera&#231;&#227;o na hora de tomar a decis&#227;o sobre smartphone para os filhos. Portanto, desenvolvi o Framework CAMPP no qual possui uma s&#233;rie de perguntas que voc&#234;, como pai, deve se fazer para orientar essa decis&#227;o:</p><p><strong>C - Circunst&#226;ncia:</strong> Qual &#233; a raz&#227;o real por tr&#225;s de dar um smartphone hoje para o seu filho? Seguran&#231;a, autonomia, contato ou press&#227;o social? Seja brutalmente honesto consigo mesmo. </p><p><strong>A - Ambiente:</strong> A rela&#231;&#227;o com o seu filho &#233; forte o suficiente para que ele venha at&#233; voc&#234; quando algo der errado online? Existem regras claras, combinados estabelecidos, abertura para conselhos dentro de casa e controle parental ativo?</p><p><strong>M - Maturidade:</strong> O seu filho consegue dizer n&#227;o a amigos, a estranhos, a conte&#250;do inadequado? Ele entende o conceito de privacidade e consequ&#234;ncias digitais?</p><p><strong>P - Privacidade de dados:</strong> Voc&#234; sabe quais dados o dispositivo coleta? Conhece ferramentas de controle parental e monitoramento? Est&#225; preparado para exercer os direitos legais dos seus filhos? Sabe explicar os sinais de alerta no ambiente digital antes de entregar um smartphone?</p><p><strong>P - Presen&#231;a:</strong> Voc&#234; acompanha ativamente o que o seu filho faz online? Conhece as plataformas, as g&#237;rias, os <em>trends</em> do momento? Se interessa pelos gostos dele(a)? Consegue introduzir e manter bons h&#225;bitos de uso de smartphone ou tamb&#233;m se encontra em v&#237;cio de telas?  O smartphone ser&#225; um facilitador na rotina ou ir&#225; substituir a presen&#231;a dos pais?</p><p>O mundo digital chegou para ficar. Mas nenhuma tecnologia substitui o que acontece quando um pai est&#225; presente, atento e informado. Presen&#231;a &#233; prote&#231;&#227;o. Sempre foi. Agora tamb&#233;m precisa ser online.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://giulianamartha.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscrever&quot;,&quot;language&quot;:&quot;pt&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Parent Presence Newsletter &#233; uma publica&#231;&#227;o apoiada pelos leitores. Para receber novos posts e apoiar o meu trabalho, considere tornar-se um subscritor gratuito ou pago.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Digite o seu e-mail..." tabindex="-1"><input type="submit" class="button primary" value="Subscrever"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item></channel></rss>